White House signals it won't support CISPA in present form
Calls for more privacy, civil liberties protections in reintroduced Cyber Intelligence Sharing and Protection Act
Computerworld - In what's quickly turning out to be a replay of events from last year, the White House today signaled that it would not support the recently reintroduced Cyber Intelligence Sharing and Protection Act (CISPA) in its present form.
A statement from the White House National Security Council expressed support for CISPA's broad goals but stressed the importance of having adequate privacy protections built into the legislation.
"We continue to believe that information-sharing improvements are essential to effective legislation," NSC spokeswoman Caitlin Hayden said in an emailed statement on Thursday afternoon. "But they must include privacy and civil liberties protections, reinforce the roles of civilian and intelligence agencies, and include targeted liability protections."
The Obama Administration will continue to work with the bill's authors and build upon the ongoing dialogue that it has had with them over the past several months, Hayden said. However, she made it clear that the bill in its present form does not incorporate the changes that the Administration has been seeking.
"We believe the adopted committee amendments reflect a good faith-effort to incorporate some of the Administration's important substantive concerns, but we do not believe these changes have addressed some outstanding fundamental priorities," Hayden said.
Similar concerns prompted the White House to issue a veto threat last year after the House approved CISPA amid a maelstrom of protests from digital rights groups.
Hayden's statement comes less than a day after the U.S. House Intelligence Committee voted 18-2 to pass CISPA through committee despite mounting opposition from privacy and rights groups, which see the bill as eviscerating existing privacy laws.
In comments made after the bill was voted to the House floor, the authors of CISPA, House Intelligence Committee Chairman Mike Rogers (R-MI) and Ranking Member C.A. Dutch Ruppersberger (D-MD), pointed to six amendments that have been made to the bill to accommodate privacy concerns.
The amendments included one that would require the government to strip away any private information they receive from companies participating in information sharing, another that would prohibit companies from hacking back at attackers and a third that would strictly limit the use of threat information, gathered via information sharing arrangements, to cybersecurity purposes. The government will also no longer be permitted to use threat information for broader "national security" purposes as provided for under the original bill.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Cybercrime and Hacking White Papers | Webcasts